Skip to content

Commit edb1f3e

Browse files
Merge pull request #269174 from TimShererWithAquent/us229476a
PowerShell references: Add Azure AD and MSOnline PowerShell deprecation note
2 parents 9d4676d + 7b31698 commit edb1f3e

File tree

5 files changed

+14
-5
lines changed

5 files changed

+14
-5
lines changed

articles/azure-monitor/alerts/action-groups.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.author: abbyweisberg
55
ms.topic: conceptual
66
ms.date: 05/02/2023
77
ms.reviewer: jagummersall
8-
ms.custom: references_regions, devx-track-arm-template, has-azure-ad-ps-ref
8+
ms.custom: references_regions, devx-track-arm-template, has-azure-ad-ps-ref, azure-ad-ref-level-one-done
99
---
1010
# Action groups
1111
When Azure Monitor data indicates that there might be a problem with your infrastructure or application, an alert is triggered. Alerts can contain action groups, which are a collection of notification preferences. Azure Monitor, Azure Service Health, and Azure Advisor use action groups to notify users about the alert and take an action.
@@ -468,6 +468,8 @@ For an overview of Microsoft Entra applications and service principals, see [Mic
468468
> Basic authentication isn't supported for `SecureWebhook`. To use basic authentication, you must use `Webhook`.
469469
If you use the webhook action, your target webhook endpoint must be able to process the various JSON payloads that different alert sources emit. If the webhook endpoint expects a specific schema, for example, the Microsoft Teams schema, use the Logic Apps action to transform the alert schema to meet the target webhook's expectations.
470470

471+
[!INCLUDE [Azure AD PowerShell deprecation note](~/articles/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
472+
471473
1. Create a Microsoft Entra application for your protected web API. For more information, see [Protected web API: App registration](../../active-directory/develop/scenario-protected-web-api-app-registration.md). Configure your protected API to be called by a daemon app and expose application permissions, not delegated permissions. For more information about these permissions, see [If your web API is called by a service or daemon app](../../active-directory/develop/scenario-protected-web-api-app-registration.md#if-your-web-api-is-called-by-a-service-or-daemon-app).
472474

473475
> [!NOTE]

articles/data-factory/enable-aad-authentication-azure-ssis-ir.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.devlang: powershell
77
ms.topic: conceptual
88
author: chugugrace
99
ms.author: chugu
10-
ms.custom: has-azure-ad-ps-ref
10+
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
1111
ms.date: 07/17/2023
1212
---
1313

@@ -55,6 +55,8 @@ You can use an existing Microsoft Entra group or create a new one using Azure AD
5555
-MailNickName "NotSet"
5656
```
5757

58+
[!INCLUDE [Azure AD PowerShell deprecation note](~/articles/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
59+
5860
The result looks like the following example, which also displays the variable value:
5961

6062
```powershell

articles/industry/agriculture/ingest-historical-telemetry-data-in-azure-farmbeats.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: gourdsay
55
ms.topic: article
66
ms.date: 11/29/2023
77
ms.author: angour
8-
ms.custom: has-azure-ad-ps-ref
8+
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
99
---
1010

1111
# Ingest historical telemetry data
@@ -68,6 +68,8 @@ Follow these steps:
6868
Connect-AzureAD
6969
```
7070
71+
[!INCLUDE [Azure AD PowerShell deprecation note](~/articles/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
72+
7173
7. Run the following command. This downloads a script to your home directory.
7274
7375
```azurepowershell-interactive 

articles/virtual-desktop/virtual-desktop-fall-2019/deploy-diagnostics.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Deploy the diagnostics tool for Azure Virtual Desktop (classic) - Azure
33
description: How to deploy the diagnostics UX tool for Azure Virtual Desktop (classic).
44
author: Heidilohr
55
ms.topic: how-to
6-
ms.custom: has-azure-ad-ps-ref
6+
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
77
ms.date: 12/15/2020
88
ms.author: helohr
99
manager: femila
@@ -62,6 +62,7 @@ This section will show you how to use PowerShell to create the Microsoft Entra a
6262
4. Go to the [RDS-Templates GitHub repo](https://github.com/Azure/RDS-Templates/tree/master/wvd-templates/diagnostics-sample/deploy/scripts) and run the **CreateADAppRegistrationforDiagnostics.ps1** script in PowerShell.
6363
5. When the script asks you to name your app, enter a unique app name.
6464

65+
[!INCLUDE [Azure AD PowerShell deprecation note](~/articles/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
6566

6667
After the script successfully runs, it should show the following things in its output:
6768

articles/virtual-desktop/virtual-desktop-fall-2019/manage-resources-using-ui-powershell.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: Heidilohr
55
ms.topic: how-to
66
ms.date: 03/30/2020
77
ms.author: helohr
8-
ms.custom: devx-track-azurepowershell, has-azure-ad-ps-ref
8+
ms.custom: devx-track-azurepowershell, has-azure-ad-ps-ref, azure-ad-ref-level-one-done
99
manager: femila
1010
---
1111

@@ -55,6 +55,8 @@ Get started by signing in to both the Az and Azure AD PowerShell modules. Here's
5555
Connect-AzureAD
5656
```
5757
58+
[!INCLUDE [Azure AD PowerShell deprecation note](~/articles/reusable-content/msgraph-powershell/includes/aad-powershell-deprecation-note.md)]
59+
5860
4. After that, navigate to the folder where you saved the two PowerShell scripts from the RDS-Templates GitHub repo.
5961
6062
Keep the PowerShell window you used to sign in open to run additional PowerShell cmdlets while signed in.

0 commit comments

Comments
 (0)